IoT Device Identification Techniques: A Comparative Analysis for Security Practitioners

Ash Andrews, George Oikonomou, Simon M D Armour, Paul Thomas, Thomas Cattermole

Research output: Contribution to journalArticle (Academic Journal)peer-review

Abstract

As the Internet of Things (IoT) continues to grow, networks are increasingly at risk from vulnerable devicesthat allow access to attackers. Two particular threats are posed by rogue devices (i.e. devices present ona network that should not be) and unpatched devices (devices with out-of-date software or firmware). Agrowing body of research attempts to address these risks: automated IoT device identification. By usingmethods to quickly and easily identify IoT devices on a network, vulnerable devices can be identified,improving network security. Although there have been publications that survey this research, they aretypically broad, discussing IoT device identification only in passing, and do not provide a methodologyto clearly compare existing (or future) research. Our novel approach in this paper is to provide a simplemethodology for assessing and comparing research into IoT device identification, bypassing the need todelve into granular details such as specific algorithmic choices or feature selections, which are attributes notall papers have, and instead to focus on common attributes shared across papers. We provide a comprehensiveliterature review for the topic of identifying IoT devices in networks using passive network traffic, resultingin 69 publications examined. We systematically analyse the literature for key elements common across thestudies that can allow a comparative analysis, and define five we determine to be most important. We statewhy these five elements in particular are important, and discuss trends in these elements across the studies.We then produce a summary table containing just the information for the five elements for each study, andhow they can be used to understand and compare techniques, considering their context. This gives securityprofessionals and researchers the necessary tools to compare studies, both current and future, to understandhow to secure their networks and what they must consider when completing further research.
Original languageEnglish
Pages (from-to)82610-82620
Number of pages11
JournalIEEE Access
Volume13
DOIs
Publication statusPublished - 9 May 2025

Bibliographical note

Publisher Copyright:
© 2013 IEEE.

Fingerprint

Dive into the research topics of 'IoT Device Identification Techniques: A Comparative Analysis for Security Practitioners'. Together they form a unique fingerprint.

Cite this